SlideShare una empresa de Scribd logo
1 de 10
Internet in Ukraine

Actual Stats                   Critical Issues


       Olena Boltushkina for 4th Euro-SSIG
               Meissen, Germany
                  July 27, 2010
One of the lowest levels of Internet penetration
             among European countries — 25%




► Approx. 46 million people

► Over 12 million Internet users

► Over 500 000 domain names
registered in ccTLD .UA since 1992
.UA needs redelegation


       ► Company that is stated in IANA Delegation
       Record (Communication Systems Ltd.) doesn’t exist.

       ► People stated in the Record have established another
       private company (Hostmaster Ltd.) in 2001 to support
       ccTLD administration. It runs the domain today.

       ► There is another organization having a claim to run
       ccTLD — UANIC. It was created in 2002 by
       telecommunications providers and operators together
       with state telecommunications and security bodies. Its
       actions are mostly not concerted and non-transparent,
       but presented as a full-fledged Multistakeholder
       Approach.

       ► Ukrainian Telecommunications Law demands the
       organization running ccTLD to be non-governmental.
‘Tough IG’ happens,
               and they call it ‘common European practice’


► State law-enforcement authorities attack
hosting providers in a rude way
to confiscate servers with or without court
decision.

► Sometimes they mix up addresses, and
threaten people who have nothing to do
with the ‘criminal’ servers. My former
employer experienced that.

► These attacks are not frequent, but quite
regular. Ministry of Internal Affairs
presents them as a ‘common European
practice’ of fighting cybercrime.

► The method is also used in censorship
issues and business wars.
Parliament doesn’t care




                ► When you hear that Ukraine adopted a
                new law, you have to understand what the
                word ‘adopted’ means. You never know
                how many real and conscious votes were
                made.

                ► After voting on the last serious changes
                to national telecommunications law
                journalists asked Parliament members
                what they’ve just voted for. The common
                answer was ‘Oh, I don’t know!’.
The 404 Law:
         Fight against child porn or for total control?


► In October 2009 Parliament gave a new important telecommunications bill aimed
at fighting child pornography its first reading.

► The bill arouse indignation
among bloggers, ISPs, IT and law
experts together with human rights
organizations as technically
illiterate and too dangerous for
common Internet users.

► The bill received name
'The 404 Law' after the number of
votes for it and after the HTTP 404
Error as an illustration of impact
the bill could have on Ukrainian
Internet users' experience.
The 404 Law:
         Fight against child porn or for total control?




If The 404 Law was adopted in whole, ISPs could become obliged:


► to limit the access of their clients to certain websites indicated by law-
enforcement authorities — without any court decision and precise conditions.

► to store and present to Government upon their request information about all
their clients' connections to Internet — without any conditions of storing or type
of data defined.

► to monitor the whole Internet activity of their clients and report every
suspicious case to Government, though the core law doesn't give ISPs a right to
conduct such investigations.
The 404 Law:
         Fight against child porn or for total control?


If The 404 Law was adopted in whole:


► The new term 'Illegal Content' could emerge with no definition and huge
opportunities of abusive interpretation by the Government.

► Internet users could become obliged to report illegal content to Government.

► Uncertain excessive definition of child pornography could emerge (though
Ukraine ratified European Convention on Cybercrime wich already contains
one), so even a picture of naked little baby from a family album could be
interpreted and prosecuted as child porn.

► Any pictures or other information in spam messages or temporary files stored
on user's computer hard drive without his awareness could make the user guilty
of storing illegal content, and cause criminal liability.
The 404 Law:
         Fight against child porn or for total control?



Due to the common efforts of Ukrainian Internet users, experts and journalists
The 404 Law was adopted with significant changes on January 2010, but still
remains dangerous:


         ► ISPs are obliged to store and present to Government upon
         their request information about heir clients' connections to
         Internet, but it's stated that certain procedure must be defined
         and adopted as a law. There's a big chance they will never
         adopt that law and use the judicial system to use this norm the
         way they need.

         ► The final law contains non-executable norms conflicting with
         the rest of national legislation.
Thank you!
Please, feel free to contact me for questions
    or more information on the subject:
           olena.bo@gmail.com

Más contenido relacionado

La actualidad más candente

Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaAPNIC
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...Dr. Oliver Massmann
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Loveneet presentation
Loveneet presentationLoveneet presentation
Loveneet presentationLoveneet LaVi
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseSarkis Darbinyan
 
Why the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UIDWhy the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UIDAnupam Saraph
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile LawJacqueline Fick
 
Anti Trafficking - The Rules
Anti Trafficking - The RulesAnti Trafficking - The Rules
Anti Trafficking - The RulesJohn Weeks
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Net neutrality & it’s legal issues
Net neutrality & it’s legal issuesNet neutrality & it’s legal issues
Net neutrality & it’s legal issuesmruns_96
 
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act PermanentUSA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act PermanentAlex Baulf
 
Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...
Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...
Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...Greg Siskind
 

La actualidad más candente (20)

Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Loveneet presentation
Loveneet presentationLoveneet presentation
Loveneet presentation
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov case
 
Why the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UIDWhy the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UID
 
Right to information act 2005
Right to information act 2005Right to information act 2005
Right to information act 2005
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
Anti Trafficking - The Rules
Anti Trafficking - The RulesAnti Trafficking - The Rules
Anti Trafficking - The Rules
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Net neutrality & it’s legal issues
Net neutrality & it’s legal issuesNet neutrality & it’s legal issues
Net neutrality & it’s legal issues
 
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act PermanentUSA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...
Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...
Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...
 

Destacado

Vancouver Airport Taser Killing
Vancouver Airport Taser KillingVancouver Airport Taser Killing
Vancouver Airport Taser KillingRucsandraMSaulean
 
How high heels and fishnet have driven internet innovation final
How high heels and fishnet have driven internet innovation   finalHow high heels and fishnet have driven internet innovation   final
How high heels and fishnet have driven internet innovation finalThe345Muddler
 
Sexual/porn quotient quiz
Sexual/porn quotient quiz Sexual/porn quotient quiz
Sexual/porn quotient quiz handmy
 
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex LifeReality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Lifeleadingedgehealth
 
A journey of porn, piracy and digital art
A journey of porn, piracy and digital artA journey of porn, piracy and digital art
A journey of porn, piracy and digital artDomenico Barra
 
R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)Domenico Barra
 
Porn, the leading influencer of Technology
Porn, the leading influencer of Technology Porn, the leading influencer of Technology
Porn, the leading influencer of Technology Tricode (part of Dept)
 
'The Future Of Porn' SXSW 2013
'The Future Of Porn' SXSW 2013'The Future Of Porn' SXSW 2013
'The Future Of Porn' SXSW 2013Cindy Gallop
 
Code of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesCode of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesJohn Bernal
 

Destacado (13)

Vancouver Airport Taser Killing
Vancouver Airport Taser KillingVancouver Airport Taser Killing
Vancouver Airport Taser Killing
 
How high heels and fishnet have driven internet innovation final
How high heels and fishnet have driven internet innovation   finalHow high heels and fishnet have driven internet innovation   final
How high heels and fishnet have driven internet innovation final
 
taser
tasertaser
taser
 
FBI Cybercrime Presentation
FBI Cybercrime PresentationFBI Cybercrime Presentation
FBI Cybercrime Presentation
 
Sexual/porn quotient quiz
Sexual/porn quotient quiz Sexual/porn quotient quiz
Sexual/porn quotient quiz
 
Thoughts on Revenge Porn
Thoughts on Revenge PornThoughts on Revenge Porn
Thoughts on Revenge Porn
 
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex LifeReality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
 
A journey of porn, piracy and digital art
A journey of porn, piracy and digital artA journey of porn, piracy and digital art
A journey of porn, piracy and digital art
 
R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)
 
6 pornography
6 pornography6 pornography
6 pornography
 
Porn, the leading influencer of Technology
Porn, the leading influencer of Technology Porn, the leading influencer of Technology
Porn, the leading influencer of Technology
 
'The Future Of Porn' SXSW 2013
'The Future Of Porn' SXSW 2013'The Future Of Porn' SXSW 2013
'The Future Of Porn' SXSW 2013
 
Code of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesCode of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the Philippines
 

Similar a Internet in Ukraine

International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...Samuel Barros
 
Vodafone law enforcement_disclosure_report_june 2014
Vodafone law enforcement_disclosure_report_june 2014Vodafone law enforcement_disclosure_report_june 2014
Vodafone law enforcement_disclosure_report_june 2014ngocjos
 
Vodafone law enforcement disclosure report
Vodafone law enforcement disclosure reportVodafone law enforcement disclosure report
Vodafone law enforcement disclosure reportLupacz
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsGener Luis Morada
 
Net neutrality, citizenship and discrimination
Net neutrality, citizenship and discriminationNet neutrality, citizenship and discrimination
Net neutrality, citizenship and discriminationblogzilla
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internetguesta5c32a
 
State of the Internet
State of the InternetState of the Internet
State of the InternetCharles Mok
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Arm Igf
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...CODE BLUE
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
 

Similar a Internet in Ukraine (20)

12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
 
Vodafone law enforcement_disclosure_report_june 2014
Vodafone law enforcement_disclosure_report_june 2014Vodafone law enforcement_disclosure_report_june 2014
Vodafone law enforcement_disclosure_report_june 2014
 
Vodafone law enforcement disclosure report
Vodafone law enforcement disclosure reportVodafone law enforcement disclosure report
Vodafone law enforcement disclosure report
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 
Net neutrality, citizenship and discrimination
Net neutrality, citizenship and discriminationNet neutrality, citizenship and discrimination
Net neutrality, citizenship and discrimination
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
 
Internet governance
Internet governanceInternet governance
Internet governance
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 

Último

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Internet in Ukraine

  • 1. Internet in Ukraine Actual Stats Critical Issues Olena Boltushkina for 4th Euro-SSIG Meissen, Germany July 27, 2010
  • 2. One of the lowest levels of Internet penetration among European countries — 25% ► Approx. 46 million people ► Over 12 million Internet users ► Over 500 000 domain names registered in ccTLD .UA since 1992
  • 3. .UA needs redelegation ► Company that is stated in IANA Delegation Record (Communication Systems Ltd.) doesn’t exist. ► People stated in the Record have established another private company (Hostmaster Ltd.) in 2001 to support ccTLD administration. It runs the domain today. ► There is another organization having a claim to run ccTLD — UANIC. It was created in 2002 by telecommunications providers and operators together with state telecommunications and security bodies. Its actions are mostly not concerted and non-transparent, but presented as a full-fledged Multistakeholder Approach. ► Ukrainian Telecommunications Law demands the organization running ccTLD to be non-governmental.
  • 4. ‘Tough IG’ happens, and they call it ‘common European practice’ ► State law-enforcement authorities attack hosting providers in a rude way to confiscate servers with or without court decision. ► Sometimes they mix up addresses, and threaten people who have nothing to do with the ‘criminal’ servers. My former employer experienced that. ► These attacks are not frequent, but quite regular. Ministry of Internal Affairs presents them as a ‘common European practice’ of fighting cybercrime. ► The method is also used in censorship issues and business wars.
  • 5. Parliament doesn’t care ► When you hear that Ukraine adopted a new law, you have to understand what the word ‘adopted’ means. You never know how many real and conscious votes were made. ► After voting on the last serious changes to national telecommunications law journalists asked Parliament members what they’ve just voted for. The common answer was ‘Oh, I don’t know!’.
  • 6. The 404 Law: Fight against child porn or for total control? ► In October 2009 Parliament gave a new important telecommunications bill aimed at fighting child pornography its first reading. ► The bill arouse indignation among bloggers, ISPs, IT and law experts together with human rights organizations as technically illiterate and too dangerous for common Internet users. ► The bill received name 'The 404 Law' after the number of votes for it and after the HTTP 404 Error as an illustration of impact the bill could have on Ukrainian Internet users' experience.
  • 7. The 404 Law: Fight against child porn or for total control? If The 404 Law was adopted in whole, ISPs could become obliged: ► to limit the access of their clients to certain websites indicated by law- enforcement authorities — without any court decision and precise conditions. ► to store and present to Government upon their request information about all their clients' connections to Internet — without any conditions of storing or type of data defined. ► to monitor the whole Internet activity of their clients and report every suspicious case to Government, though the core law doesn't give ISPs a right to conduct such investigations.
  • 8. The 404 Law: Fight against child porn or for total control? If The 404 Law was adopted in whole: ► The new term 'Illegal Content' could emerge with no definition and huge opportunities of abusive interpretation by the Government. ► Internet users could become obliged to report illegal content to Government. ► Uncertain excessive definition of child pornography could emerge (though Ukraine ratified European Convention on Cybercrime wich already contains one), so even a picture of naked little baby from a family album could be interpreted and prosecuted as child porn. ► Any pictures or other information in spam messages or temporary files stored on user's computer hard drive without his awareness could make the user guilty of storing illegal content, and cause criminal liability.
  • 9. The 404 Law: Fight against child porn or for total control? Due to the common efforts of Ukrainian Internet users, experts and journalists The 404 Law was adopted with significant changes on January 2010, but still remains dangerous: ► ISPs are obliged to store and present to Government upon their request information about heir clients' connections to Internet, but it's stated that certain procedure must be defined and adopted as a law. There's a big chance they will never adopt that law and use the judicial system to use this norm the way they need. ► The final law contains non-executable norms conflicting with the rest of national legislation.
  • 10. Thank you! Please, feel free to contact me for questions or more information on the subject: olena.bo@gmail.com